<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 10.2 thru 11 Trusted system in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828400#M754789</link>
    <description>is there one easy command that you can type in that will inform the user if the system is in trusted mode or not?&lt;BR /&gt;&lt;BR /&gt;TD</description>
    <pubDate>Thu, 17 Oct 2002 20:56:38 GMT</pubDate>
    <dc:creator>Waltina L. DiPaolo</dc:creator>
    <dc:date>2002-10-17T20:56:38Z</dc:date>
    <item>
      <title>10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828400#M754789</link>
      <description>is there one easy command that you can type in that will inform the user if the system is in trusted mode or not?&lt;BR /&gt;&lt;BR /&gt;TD</description>
      <pubDate>Thu, 17 Oct 2002 20:56:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828400#M754789</guid>
      <dc:creator>Waltina L. DiPaolo</dc:creator>
      <dc:date>2002-10-17T20:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: 10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828401#M754790</link>
      <description>Hi TD,&lt;BR /&gt;&lt;BR /&gt;I can't think of an easy one that a normal user can run outside of a script to check for the existence of the /tcb/files/auth/r dir or such&lt;BR /&gt;&lt;BR /&gt;Like create a script called trustedy_n containing&lt;BR /&gt;&lt;BR /&gt;if [ -d /tcb/files/auth/r ]&lt;BR /&gt;then echo "System IS Trusted"&lt;BR /&gt;else echo "System is NOT Trusted"&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;Then user could run that script &amp;amp; if the /tcb/files/auth/r dir exists (And it will ALWAYS exist on all trusted systems to hold the entry for root) it will echo appropriately.&lt;BR /&gt;&lt;BR /&gt;But I'm not sure if after unconverting the dir still remains....&lt;BR /&gt;&lt;BR /&gt;Else if root users are to run a command - then I'd run&lt;BR /&gt;getprpw root&lt;BR /&gt;to display root's trusted DB entry settings.&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff&lt;BR /&gt;</description>
      <pubDate>Thu, 17 Oct 2002 21:38:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828401#M754790</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-10-17T21:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: 10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828402#M754791</link>
      <description>It is fairly simple.&lt;BR /&gt;&lt;BR /&gt;on a trusted system you will get the usage:&lt;BR /&gt;# /usr/lbin/modprdef&lt;BR /&gt;Usage: modprdef -m opt=value[,opt=value]&lt;BR /&gt;&lt;BR /&gt;On non-trusted system:&lt;BR /&gt;# /usr/lbin/modprdef&lt;BR /&gt;System is not trusted&lt;BR /&gt;&lt;BR /&gt;The coding of command checks to see if the system is trusted first before it does anything. There are a few commands in /usr/lbin that will do this.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 17 Oct 2002 21:39:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828402#M754791</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2002-10-17T21:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: 10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828403#M754792</link>
      <description>Run the command ..&lt;BR /&gt;# /usr/lbin/modprdef&lt;BR /&gt;and it'll tell you but I think only superuser can run it.&lt;BR /&gt;Another way is to check the existence of file /tcb/files/auth/system/default. If it exists than the system is trusted. See ..&lt;BR /&gt;# man iscomsec&lt;BR /&gt;for details.</description>
      <pubDate>Thu, 17 Oct 2002 21:45:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828403#M754792</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2002-10-17T21:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: 10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828404#M754793</link>
      <description>S.K. - yep none of the trusted commands are available to "normal" users in /usr/lbin - regardless of perms setting. Believe they're hard-coded that way.&lt;BR /&gt;&lt;BR /&gt;I like the test for default file - but again I wonder if it remains if the system is converted BACK to non-trusted?&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
      <pubDate>Thu, 17 Oct 2002 21:54:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828404#M754793</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-10-17T21:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: 10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828405#M754794</link>
      <description>Yes it does check. If you do a 'strings modprdef' it will report 'Not Superuser'&lt;BR /&gt;&lt;BR /&gt;Where is the 'iscomsec' program ? I have the man page but no command....?</description>
      <pubDate>Thu, 17 Oct 2002 22:02:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828405#M754794</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2002-10-17T22:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: 10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828406#M754795</link>
      <description>Michael,&lt;BR /&gt;&lt;BR /&gt;Believe it's a function in the /usr/include/prot.h file.&lt;BR /&gt;&lt;BR /&gt;Jeff</description>
      <pubDate>Thu, 17 Oct 2002 22:20:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828406#M754795</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-10-17T22:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: 10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828407#M754796</link>
      <description>It's a system call, not a regular executable. If all iscomsec() is doing is checking for existence of the "default" file to detemine if the system is trusted or not (from the man page), I don;t see why we can't just say "ls /tcb/files/auth/system/default" and if it's there, it's trusted.</description>
      <pubDate>Thu, 17 Oct 2002 22:22:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828407#M754796</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2002-10-17T22:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: 10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828408#M754797</link>
      <description>I have several systems in trusted mode.  Don't really want to revert back to test to see of the modprdef still works.  Is there a doc you can refer me to, other than the man pages, that will give me a bit more info?&lt;BR /&gt;&lt;BR /&gt;TD</description>
      <pubDate>Fri, 18 Oct 2002 13:14:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828408#M754797</guid>
      <dc:creator>Waltina L. DiPaolo</dc:creator>
      <dc:date>2002-10-18T13:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: 10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828409#M754798</link>
      <description>Check out these docs.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.docs.hp.com/cgi-bin/fsearch/framedisplay?top=/hpux/onlinedocs/B2355-90121/B2355-90121_top.html&amp;amp;con=/hpux/onlinedocs/B2355-90121/00/00/4-con.html&amp;amp;toc=/hpux/onlinedocs/B2355-90121/00/00/4-toc.html&amp;amp;searchterms=trusted&amp;amp;queryid=20021018-082055" target="_blank"&gt;http://www.docs.hp.com/cgi-bin/fsearch/framedisplay?top=/hpux/onlinedocs/B2355-90121/B2355-90121_top.html&amp;amp;con=/hpux/onlinedocs/B2355-90121/00/00/4-con.html&amp;amp;toc=/hpux/onlinedocs/B2355-90121/00/00/4-toc.html&amp;amp;searchterms=trusted&amp;amp;queryid=20021018-082055&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.docs.hp.com/cgi-bin/fsearch/framedisplay?top=/hpux/onlinedocs/B2355-90742/B2355-90742_top.html&amp;amp;con=/hpux/onlinedocs/B2355-90742/00/00/66-con.html&amp;amp;toc=/hpux/onlinedocs/B2355-90742/00/00/66-toc.html&amp;amp;searchterms=trusted&amp;amp;queryid=20021018-082055" target="_blank"&gt;http://www.docs.hp.com/cgi-bin/fsearch/framedisplay?top=/hpux/onlinedocs/B2355-90742/B2355-90742_top.html&amp;amp;con=/hpux/onlinedocs/B2355-90742/00/00/66-con.html&amp;amp;toc=/hpux/onlinedocs/B2355-90742/00/00/66-toc.html&amp;amp;searchterms=trusted&amp;amp;queryid=20021018-082055&lt;/A&gt;</description>
      <pubDate>Fri, 18 Oct 2002 13:17:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828409#M754798</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2002-10-18T13:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: 10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828410#M754799</link>
      <description>Thanks.  I've already read over them.  They're not detailed enough.  But thanks.&lt;BR /&gt;&lt;BR /&gt;TD</description>
      <pubDate>Fri, 18 Oct 2002 16:05:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828410#M754799</guid>
      <dc:creator>Waltina L. DiPaolo</dc:creator>
      <dc:date>2002-10-18T16:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: 10.2 thru 11 Trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828411#M754800</link>
      <description>There is no iscomsec program, but it would be trivial to write one that calls iscomsec and returns an exit status based on the result.&lt;BR /&gt;From the iscomsec manual page:&lt;BR /&gt;&lt;BR /&gt;Notes&lt;BR /&gt;      iscomsec determines if the system is a trusted system or not by&lt;BR /&gt;      checking the file, /tcb/files/auth/system/default.  If the file&lt;BR /&gt;      exists, then the system is a trusted system.  If the file does not&lt;BR /&gt;      exist, then the system is not a trusted system.&lt;BR /&gt;</description>
      <pubDate>Sun, 20 Oct 2002 09:31:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/10-2-thru-11-trusted-system/m-p/2828411#M754800</guid>
      <dc:creator>doug hosking</dc:creator>
      <dc:date>2002-10-20T09:31:46Z</dc:date>
    </item>
  </channel>
</rss>

